User Guide
Page 3
...or transmitted in any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without notice. This publication is a registered trademark of others. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any ... written permission of their respective owners. Published by ZyXEL Communications Corporation. Copyright 3 ZyXEL further reserves the right to change without notice. G-470 User's Guide Copyright Copyright © 2006 by ZyXEL Communications Corporation. All rights reserved. The contents of...
...or transmitted in any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without notice. This publication is a registered trademark of others. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any ... written permission of their respective owners. Published by ZyXEL Communications Corporation. Copyright 3 ZyXEL further reserves the right to change without notice. G-470 User's Guide Copyright Copyright © 2006 by ZyXEL Communications Corporation. All rights reserved. The contents of...
User Guide
Page 33
...auto mode if you to configure up to keep network communications private. You must use the same WEP key for ease-of the ZyXEL utility and entering them manually as the default key at any transmitted data that is case sensitive. There are defined: Auto, Open System and Shared Key. ...8226; Open System mode is not an issue. G-470 User's Guide 5 Additionally, Jenny uses her own private key to encrypt a message and Tim uses ...
...auto mode if you to configure up to keep network communications private. You must use the same WEP key for ease-of the ZyXEL utility and entering them manually as the default key at any transmitted data that is case sensitive. There are defined: Auto, Open System and Shared Key. ...8226; Open System mode is not an issue. G-470 User's Guide 5 Additionally, Jenny uses her own private key to encrypt a message and Tim uses ...
User Guide
Page 46
...on-screen instructions to see the other WEP keys. One key displays in the Key 1 field. 46 Chapter 4 Introducing the Web Configurator or • Enter a manual key in the Key 1 field. Go to Wireless > Security if you can enter a Passphrase (up the WEP keys. 2 Choose an encryption level from the.... The device automatically generates WEP keys. The higher the WEP encryption, the higher the security but the slower the throughput. 3 You can generate or manually enter a WEP key. • If you selected 64-bit or 128-bit WEP, you want to set up to 16 printable characters) and click...
...on-screen instructions to see the other WEP keys. One key displays in the Key 1 field. 46 Chapter 4 Introducing the Web Configurator or • Enter a manual key in the Key 1 field. Go to Wireless > Security if you can enter a Passphrase (up the WEP keys. 2 Choose an encryption level from the.... The device automatically generates WEP keys. The higher the WEP encryption, the higher the security but the slower the throughput. 3 You can generate or manually enter a WEP key. • If you selected 64-bit or 128-bit WEP, you want to set up to 16 printable characters) and click...
User Guide
Page 47
Chapter 4 Introducing the Web Configurator 47 This field is case-sensitive. Type a pre-shared key from 8 to automatically generate keys or manually enter a key in the Key 1 field. 4.4.3.3 WPA-PSK Select WPA-PSK only if your wireless AP supports it. Figure 22 Wizard 3: WEP G-470 User's Guide Use Passphrase to 63 ASCII characters (including spaces and symbols).
Chapter 4 Introducing the Web Configurator 47 This field is case-sensitive. Type a pre-shared key from 8 to automatically generate keys or manually enter a key in the Key 1 field. 4.4.3.3 WPA-PSK Select WPA-PSK only if your wireless AP supports it. Figure 22 Wizard 3: WEP G-470 User's Guide Use Passphrase to 63 ASCII characters (including spaces and symbols).
User Guide
Page 59
...stop wireless communications between the device and other wireless LAN devices. Select Pure B Mode to set the ZyXEL Device to the ETHERNET port. This address is capable of "cloning", or emulating, the MAC addresses of... address into the Clone MAC address field and select Manual to 32 printable characters) for the wireless connection. Chapter 6 Wireless Screens 59 You must have the ZyXEL Device automatically use the MAC address of one or...the wireless settings of the device in this screen. G-470 User's Guide The following table describes the labels in this field.
...stop wireless communications between the device and other wireless LAN devices. Select Pure B Mode to set the ZyXEL Device to the ETHERNET port. This address is capable of "cloning", or emulating, the MAC addresses of... address into the Clone MAC address field and select Manual to 32 printable characters) for the wireless connection. Chapter 6 Wireless Screens 59 You must have the ZyXEL Device automatically use the MAC address of one or...the wireless settings of the device in this screen. G-470 User's Guide The following table describes the labels in this field.
User Guide
Page 63
..., click Generate to begin configuring this screen. Click Reset to have the device create four different WEP keys. Figure 32 Wireless Security: WEP G-470 User's Guide The following table describes the labels in the field provided. Select Open or Shared from the drop-down list box. After you... chose 128 bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). Select a WEP key to manually set the WEP keys, enter the WEP key in this screen afresh. Click Apply to save your changes back to encrypt data. With 64-bit...
..., click Generate to begin configuring this screen. Click Reset to have the device create four different WEP keys. Figure 32 Wireless Security: WEP G-470 User's Guide The following table describes the labels in the field provided. Select Open or Shared from the drop-down list box. After you... chose 128 bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). Select a WEP key to manually set the WEP keys, enter the WEP key in this screen afresh. Click Apply to save your changes back to encrypt data. With 64-bit...
User Guide
Page 68
G-470 User's Guide Table 14 Wireless Security: 802.1x LABEL Login Name Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) User Certificate File (EAP-TLS .... After you chose 64 bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). With 64-bit or 128-bit WEP, you want to manually set up to 32 case-sensitive printable characters and click Generate to verify the certificate of up on a RADIUS server. Click Reset to the list...
G-470 User's Guide Table 14 Wireless Security: 802.1x LABEL Login Name Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) User Certificate File (EAP-TLS .... After you chose 64 bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). With 64-bit or 128-bit WEP, you want to manually set up to 32 case-sensitive printable characters and click Generate to verify the certificate of up on a RADIUS server. Click Reset to the list...
User Guide
Page 94
Table 25 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTER MANUAL KEY Open None No Open Shared WPA WPA-PSK WPA2 WPA2-PSK WEP No Yes Yes WEP No Yes Yes TKIP/AES No TKIP/AES ... Enable Disable Enable Disable 94 Appendix B MAC address filters are not dependent on how you should configure for each Authentication Method/ key management protocol type. G-470 User's Guide Security Parameters Summary Refer to this table to see what other security parameters you configure these security features.
Table 25 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTER MANUAL KEY Open None No Open Shared WPA WPA-PSK WPA2 WPA2-PSK WEP No Yes Yes WEP No Yes Yes TKIP/AES No TKIP/AES ... Enable Disable Enable Disable 94 Appendix B MAC address filters are not dependent on how you should configure for each Authentication Method/ key management protocol type. G-470 User's Guide Security Parameters Summary Refer to this table to see what other security parameters you configure these security features.
User Guide
Page 101
... one or more of the default gateway in Windows XP): Appendix C 101 G-470 User's Guide • If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. To manually configure a default metric (the number of transmission hops), clear the Automatic metric...
... one or more of the default gateway in Windows XP): Appendix C 101 G-470 User's Guide • If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. To manually configure a default metric (the number of transmission hops), clear the Automatic metric...
User Guide
Page 104
G-470 User's Guide • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address ...
G-470 User's Guide • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address ...
User Guide
Page 105
Figure 67 Macintosh OS X: Network G-470 User's Guide 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Router address box if you have one. 5 Click Apply Now and close the window. 6 Restart your gateway in the Network window. Appendix C 105
Figure 67 Macintosh OS X: Network G-470 User's Guide 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Router address box if you have one. 5 Click Apply Now and close the window. 6 Restart your gateway in the Network window. Appendix C 105
User Guide
Page 110
G-470 User's Guide W Warranty 6 Web Configurator 21, 35 accessing 39 Web configurator 35 WEP 33 default key 33 manual setup 33 passphrase 33 WEP (Wired Equivalent Privacy) 33 WEP key automatic 33 manual 33 Wi-Fi Protected Access 34, 91 Wired Equivalent Privacy 33 Wired network 24 Wireless client 31 Wireless LAN 22 basics... WLAN Security parameters 94 WLAN light 23 WPA 34, 91 WPA 2 34 WPA2 91 WPA2-Pre-Shared Key 91 WPA2-PSK 91 WPA-PSK 91 Z ZyXEL glossary 19 ZyXEL Limited Warranty Note 6 ZyXEL Web Site 19 110 Index
G-470 User's Guide W Warranty 6 Web Configurator 21, 35 accessing 39 Web configurator 35 WEP 33 default key 33 manual setup 33 passphrase 33 WEP (Wired Equivalent Privacy) 33 WEP key automatic 33 manual 33 Wi-Fi Protected Access 34, 91 Wired Equivalent Privacy 33 Wired network 24 Wireless client 31 Wireless LAN 22 basics... WLAN Security parameters 94 WLAN light 23 WPA 34, 91 WPA 2 34 WPA2 91 WPA2-Pre-Shared Key 91 WPA2-PSK 91 WPA-PSK 91 Z ZyXEL glossary 19 ZyXEL Limited Warranty Note 6 ZyXEL Web Site 19 110 Index